H04L12/4675

INTEROPERABILITY BETWEEN SYMMETRIC AND ASYMMETRIC EVPN IRB MODES
20200322268 · 2020-10-08 ·

A system and method are disclosed for enabling interoperability between asymmetric and symmetric Integrated Routing and Bridging (IRB) modes. A system is configured to receive a route advertisement, examine the label fields of the route advertisement, and determine whether Layer 2 or Layer 3 information is conveyed. The system is further configured to build a route advertisement to advertise to a second device based on whether Layer 2 or Layer 3 information is conveyed in the first route advertisement.

EXTENDING ENTERPRISE TRUSTED POLICY FRAMEWORK TO CLOUD NATIVE APPLICATIONS

The present technology pertains to a system and method for extending enterprise networks' trusted policy frameworks to cloud-native applications. The present technology comprises sending, by an enterprise network controller, a first communication to a service mesh orchestrator for a service mesh, wherein the first communication informs the service mesh orchestrator of traffic segmentation policies to be applied to traffic originating at an enterprise network and of layer 7 extension headers which correspond to the enterprise network traffic segmentation policies.

Dynamic burn slot allocator

An information handling system receives a media access control address associated with a device installed in a burn slot, and determines a virtual private network that is associated with the media access control address. The system also determines a switch port in a network switch that corresponds to the virtual private network, and dynamically assigns the switch port that corresponds to the virtual private network to the device installed in the burn slot. The system instructs the network switch to route packets of data associated with the virtual private network via the switch port to the device installed in the burn slot.

Systems and methods for extending link layer discovery over virtual Ethernet bridges
10785120 · 2020-09-22 · ·

In accordance with embodiments of the present disclosure, an information handling system may include a host system comprising a host system processor and a network interface coupled to the host system processor and may include a management controller communicatively coupled to the host system processor and configured to provide management of the information handling system. The network interface may be configured to capture discovery protocol packets and encode the discovery protocol packets with extended discovery protocol information comprising information regarding physical functions, virtual functions, and ports associated with the discovery protocol packets.

Sharing a subnet of a logically isolated network between client accounts of a provider network

A subnet of a logically isolated network within a provider network may be shared between client accounts of the provider network. A request to share a subnet of a logically isolated network created for one client account with another client account may be received. A link between an account object for the other client account and a shared subnet object for the subnet may be stored. When a request to host a resource with the subnet is received, an evaluation of the graph may indicate whether the request to place the host is permitted. If permitted, the resource for the other client host may be hosted within the subnet.

Intelligent learning and management of a networked architecture
10785108 · 2020-09-22 · ·

The innovation disclosed and claimed herein, in one aspect thereof, comprises systems and methods of intelligent learning and management of networked architectures. The innovation maps a networked architecture. The networked architecture includes elements having software elements and hardware elements interconnected in a common environment. The innovation determines data sources associated with the set of elements using the identifiers. The innovation compiles data associated with the set of elements into a knowledgebase. The innovation utilizes machine learning to analyze information from the data sources. The innovation determines a configuration for at least one element in the environment based on the mapping. The innovation executes the configuration based on the configuration.

Route Processing Method and Apparatus, and Data Transmission Method and Apparatus
20200296025 · 2020-09-17 ·

A route processing method is implemented by a first PE device and includes receiving a VPN route that includes a second SRv6 VPN SID and a third SRv6 VPN SID from a second PE device; determining that the second SRv6 VPN SID is the same as a first SRv6 VPN SID; and establishing a second path based on the third SRv6 VPN SID, where when a first path directly connected to the first PE device and the second CE device is faulty, the second path is used by the first PE device to forward a packet to the second CE device.

MULTICAST SOURCE DISCOVERY MECHANISM TO AVOID MULTICAST-TRAFFIC SYNC BETWEEN ACTIVE MULTI-HOMING PEERS OR ANY CAST GATEWAY L2 STRETCH

Systems, methods, and computer-readable media for controlling multicast traffic flows through provider edge routers. In some examples, a multicast traffic of one or more multicast traffic flows is received from a multicast source at a first provider edge router of a plurality of provider edge routers. A multicast routing message including a loopback address of the first provider edge router can be originated at the first provider edge router. The multicast routing message can be flooded into a multicast core network for controlling traffic in the one or more multicast flows through the multicast core network to the first provider edge router. Subsequently, multicast joins can be received at the first provider edge router for establishing the one or more multicast flows through the multicast core network based on the multicast routing message including the loopback address of the first provider edge router.

LAN/SAN network security management

An apparatus for managing network security includes an inventory module, a survey module, an observation module, and a security module. The inventory module identifies each node of a network. The survey module gathers information for each node of the network. The security module generates notifications to one or more users in response to the observation module detecting one or more irregularities.

Method and apparatus for creating and managing network device port VLAN configurations
10756984 · 2020-08-25 · ·

A method for managing VLAN configurations on a network device includes connecting, by a client, to the network device. The method then includes presenting, by the client, a graphical user interface of the network device to a user of the client. The graphical user interface comprises a first area displaying a plurality of ports of the network device and a second area displaying a configuration interface. The configuration interface enables the user to make a VLAN assignment for each of the plurality of ports. Both the first area and the second area are displayed on one page in the graphical user interface. The method then includes accepting, through the graphical user interface, user instructions for making the VLAN assignment. The method then includes transmitting, by the client, a signal to the network device, the signal encoding the user instructions and enabling the network device to make the VLAN assignment.